Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-55198 (GCVE-0-2025-55198)
Vulnerability from cvelistv5
- CWE-908 - Use of Uninitialized Resource
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-55198",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-14T13:41:00.963620Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-14T14:50:32.593Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "helm",
"vendor": "helm",
"versions": [
{
"status": "affected",
"version": "\u003c 3.18.5"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Helm is a package manager for Charts for Kubernetes. Prior to version 3.18.5, when parsing Chart.yaml and index.yaml files, an improper validation of type error can lead to a panic. This issue has been resolved in Helm 3.18.5. A workaround involves ensuring YAML files are formatted as Helm expects prior to processing them with Helm."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-908",
"description": "CWE-908: Use of Uninitialized Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-13T23:23:56.780Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/helm/helm/security/advisories/GHSA-f9f8-9pmf-xv68",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/helm/helm/security/advisories/GHSA-f9f8-9pmf-xv68"
},
{
"name": "https://github.com/helm/helm/commit/ec5f59e2db56533d042a124f5bae54dd87b558e6",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/helm/helm/commit/ec5f59e2db56533d042a124f5bae54dd87b558e6"
}
],
"source": {
"advisory": "GHSA-f9f8-9pmf-xv68",
"discovery": "UNKNOWN"
},
"title": "Helm May Panic Due To Incorrect YAML Content"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2025-55198",
"datePublished": "2025-08-13T23:23:56.780Z",
"dateReserved": "2025-08-08T21:55:07.964Z",
"dateUpdated": "2025-08-14T14:50:32.593Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-55198\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-08-14T00:15:26.557\",\"lastModified\":\"2025-08-21T21:28:21.383\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Helm is a package manager for Charts for Kubernetes. Prior to version 3.18.5, when parsing Chart.yaml and index.yaml files, an improper validation of type error can lead to a panic. This issue has been resolved in Helm 3.18.5. A workaround involves ensuring YAML files are formatted as Helm expects prior to processing them with Helm.\"},{\"lang\":\"es\",\"value\":\"Helm es un gestor de paquetes para Charts en Kubernetes. Antes de la versi\u00f3n 3.18.5, al analizar los archivos Chart.yaml e index.yaml, un error de validaci\u00f3n de tipo incorrecto pod\u00eda provocar un error de p\u00e1nico. Este problema se ha resuelto en Helm 3.18.5. Una soluci\u00f3n alternativa consiste en asegurarse de que los archivos YAML tengan el formato esperado por Helm antes de procesarlos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-908\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.18.5\",\"matchCriteriaId\":\"86EA4912-E62D-4FD6-B405-D21657779F99\"}]}]}],\"references\":[{\"url\":\"https://github.com/helm/helm/commit/ec5f59e2db56533d042a124f5bae54dd87b558e6\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/helm/helm/security/advisories/GHSA-f9f8-9pmf-xv68\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-55198\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-14T13:41:00.963620Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-14T13:41:03.814Z\"}}], \"cna\": {\"title\": \"Helm May Panic Due To Incorrect YAML Content\", \"source\": {\"advisory\": \"GHSA-f9f8-9pmf-xv68\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"helm\", \"product\": \"helm\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 3.18.5\"}]}], \"references\": [{\"url\": \"https://github.com/helm/helm/security/advisories/GHSA-f9f8-9pmf-xv68\", \"name\": \"https://github.com/helm/helm/security/advisories/GHSA-f9f8-9pmf-xv68\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/helm/helm/commit/ec5f59e2db56533d042a124f5bae54dd87b558e6\", \"name\": \"https://github.com/helm/helm/commit/ec5f59e2db56533d042a124f5bae54dd87b558e6\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Helm is a package manager for Charts for Kubernetes. Prior to version 3.18.5, when parsing Chart.yaml and index.yaml files, an improper validation of type error can lead to a panic. This issue has been resolved in Helm 3.18.5. A workaround involves ensuring YAML files are formatted as Helm expects prior to processing them with Helm.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-908\", \"description\": \"CWE-908: Use of Uninitialized Resource\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-08-13T23:23:56.780Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-55198\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-14T14:50:32.593Z\", \"dateReserved\": \"2025-08-08T21:55:07.964Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-08-13T23:23:56.780Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
fkie_cve-2025-55198
Vulnerability from fkie_nvd
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "86EA4912-E62D-4FD6-B405-D21657779F99",
"versionEndExcluding": "3.18.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Helm is a package manager for Charts for Kubernetes. Prior to version 3.18.5, when parsing Chart.yaml and index.yaml files, an improper validation of type error can lead to a panic. This issue has been resolved in Helm 3.18.5. A workaround involves ensuring YAML files are formatted as Helm expects prior to processing them with Helm."
},
{
"lang": "es",
"value": "Helm es un gestor de paquetes para Charts en Kubernetes. Antes de la versi\u00f3n 3.18.5, al analizar los archivos Chart.yaml e index.yaml, un error de validaci\u00f3n de tipo incorrecto pod\u00eda provocar un error de p\u00e1nico. Este problema se ha resuelto en Helm 3.18.5. Una soluci\u00f3n alternativa consiste en asegurarse de que los archivos YAML tengan el formato esperado por Helm antes de procesarlos."
}
],
"id": "CVE-2025-55198",
"lastModified": "2025-08-21T21:28:21.383",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2025-08-14T00:15:26.557",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/helm/helm/commit/ec5f59e2db56533d042a124f5bae54dd87b558e6"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/helm/helm/security/advisories/GHSA-f9f8-9pmf-xv68"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-908"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
ghsa-f9f8-9pmf-xv68
Vulnerability from github
A Helm contributor discovered an improper validation of type error when parsing Chart.yaml and index.yaml files that can lead to a panic.
Impact
There are two areas of YAML validation that were impacted. First, when a Chart.yaml file had a null maintainer or the child or parent of a dependencies import-values could be parsed as something other than a string, helm lint would panic. Second, when an index.yaml had an empty entry in the list of chart versions Helm would panic on interactions with that repository.
Patches
This issue has been resolved in Helm v3.18.5.
Workarounds
Ensure YAML files are formatted as Helm expects prior to processing them with Helm.
References
Helm's security policy is spelled out in detail in our SECURITY document.
Credits
Disclosed by Jakub Ciolek at AlphaSense.
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "helm.sh/helm/v3"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.18.5"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-55198"
],
"database_specific": {
"cwe_ids": [
"CWE-908"
],
"github_reviewed": true,
"github_reviewed_at": "2025-08-14T00:05:27Z",
"nvd_published_at": "2025-08-14T00:15:26Z",
"severity": "MODERATE"
},
"details": "A Helm contributor discovered an improper validation of type error when parsing Chart.yaml and index.yaml files that can lead to a panic.\n\n### Impact\n\nThere are two areas of YAML validation that were impacted. First, when a `Chart.yaml` file had a `null` maintainer or the `child` or `parent` of a dependencies `import-values` could be parsed as something other than a string, `helm lint` would panic. Second, when an `index.yaml` had an empty entry in the list of chart versions Helm would panic on interactions with that repository.\n\n### Patches\n\nThis issue has been resolved in Helm v3.18.5.\n\n### Workarounds\n\nEnsure YAML files are formatted as Helm expects prior to processing them with Helm.\n\n### References\n\nHelm\u0027s security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.\n\n### Credits\n\nDisclosed by Jakub Ciolek at AlphaSense.",
"id": "GHSA-f9f8-9pmf-xv68",
"modified": "2025-08-14T17:15:20Z",
"published": "2025-08-14T00:05:27Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/helm/helm/security/advisories/GHSA-f9f8-9pmf-xv68"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55198"
},
{
"type": "WEB",
"url": "https://github.com/helm/helm/commit/ec5f59e2db56533d042a124f5bae54dd87b558e6"
},
{
"type": "PACKAGE",
"url": "https://github.com/helm/helm"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "Helm May Panic Due To Incorrect YAML Content"
}
opensuse-su-2025:15470-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "wicked2nm-1.2.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the wicked2nm-1.2.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15470",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15470-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "wicked2nm-1.2.1-1.1 on GA media",
"tracking": {
"current_release_date": "2025-08-20T00:00:00Z",
"generator": {
"date": "2025-08-20T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15470-1",
"initial_release_date": "2025-08-20T00:00:00Z",
"revision_history": [
{
"date": "2025-08-20T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "wicked2nm-1.2.1-1.1.aarch64",
"product": {
"name": "wicked2nm-1.2.1-1.1.aarch64",
"product_id": "wicked2nm-1.2.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "wicked2nm-1.2.1-1.1.ppc64le",
"product": {
"name": "wicked2nm-1.2.1-1.1.ppc64le",
"product_id": "wicked2nm-1.2.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "wicked2nm-1.2.1-1.1.s390x",
"product": {
"name": "wicked2nm-1.2.1-1.1.s390x",
"product_id": "wicked2nm-1.2.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "wicked2nm-1.2.1-1.1.x86_64",
"product": {
"name": "wicked2nm-1.2.1-1.1.x86_64",
"product_id": "wicked2nm-1.2.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "wicked2nm-1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.aarch64"
},
"product_reference": "wicked2nm-1.2.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wicked2nm-1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.ppc64le"
},
"product_reference": "wicked2nm-1.2.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wicked2nm-1.2.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.s390x"
},
"product_reference": "wicked2nm-1.2.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wicked2nm-1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.x86_64"
},
"product_reference": "wicked2nm-1.2.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.s390x",
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.s390x",
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.s390x",
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
opensuse-su-2025:15469-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "govulncheck-vulndb-0.0.20250818T190335-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the govulncheck-vulndb-0.0.20250818T190335-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15469",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15469-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-26154 page",
"url": "https://www.suse.com/security/cve/CVE-2023-26154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-44001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-44001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-44004 page",
"url": "https://www.suse.com/security/cve/CVE-2025-44004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-48731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-48731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-49221 page",
"url": "https://www.suse.com/security/cve/CVE-2025-49221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-50946 page",
"url": "https://www.suse.com/security/cve/CVE-2025-50946/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-52931 page",
"url": "https://www.suse.com/security/cve/CVE-2025-52931/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-53514 page",
"url": "https://www.suse.com/security/cve/CVE-2025-53514/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-53857 page",
"url": "https://www.suse.com/security/cve/CVE-2025-53857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-53910 page",
"url": "https://www.suse.com/security/cve/CVE-2025-53910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-54458 page",
"url": "https://www.suse.com/security/cve/CVE-2025-54458/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-54463 page",
"url": "https://www.suse.com/security/cve/CVE-2025-54463/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-54478 page",
"url": "https://www.suse.com/security/cve/CVE-2025-54478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-54525 page",
"url": "https://www.suse.com/security/cve/CVE-2025-54525/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55196 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55199 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55199/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-8285 page",
"url": "https://www.suse.com/security/cve/CVE-2025-8285/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-9039 page",
"url": "https://www.suse.com/security/cve/CVE-2025-9039/"
}
],
"title": "govulncheck-vulndb-0.0.20250818T190335-1.1 on GA media",
"tracking": {
"current_release_date": "2025-08-20T00:00:00Z",
"generator": {
"date": "2025-08-20T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15469-1",
"initial_release_date": "2025-08-20T00:00:00Z",
"revision_history": [
{
"date": "2025-08-20T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"product": {
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"product_id": "govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"product": {
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"product_id": "govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"product": {
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"product_id": "govulncheck-vulndb-0.0.20250818T190335-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64",
"product": {
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64",
"product_id": "govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64"
},
"product_reference": "govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le"
},
"product_reference": "govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x"
},
"product_reference": "govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
},
"product_reference": "govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-26154"
}
],
"notes": [
{
"category": "general",
"text": "Versions of the package pubnub before 7.4.0; all versions of the package com.pubnub:pubnub; versions of the package pubnub before 6.19.0; all versions of the package github.com/pubnub/go; versions of the package github.com/pubnub/go/v7 before 7.2.0; versions of the package pubnub before 7.3.0; versions of the package pubnub/pubnub before 6.1.0; versions of the package pubnub before 5.3.0; versions of the package pubnub before 0.4.0; versions of the package pubnub/c-core before 4.5.0; versions of the package com.pubnub:pubnub-kotlin before 7.7.0; versions of the package pubnub/swift before 6.2.0; versions of the package pubnub before 5.2.0; versions of the package pubnub before 4.3.0 are vulnerable to Insufficient Entropy via the getKey function, due to inefficient implementation of the AES-256-CBC cryptographic algorithm. The provided encrypt function is less secure when hex encoding and trimming are applied, leaving half of the bits in the key always the same for every encoded message or file.\r\r**Note:**\r\rIn order to exploit this vulnerability, the attacker needs to invest resources in preparing the attack and brute-force the encryption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-26154",
"url": "https://www.suse.com/security/cve/CVE-2023-26154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-26154"
},
{
"cve": "CVE-2025-44001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-44001"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to check the access of the user to the channel which allows attackers to get channel subscription details without proper access to the channel via API call to the Get Channel Subscriptions details endpoint.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-44001",
"url": "https://www.suse.com/security/cve/CVE-2025-44001"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-44001"
},
{
"cve": "CVE-2025-44004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-44004"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to check the authorization of the user to the Mattermost instance which allows attackers to create a channel subscription without proper authorization via API call to the create channel subscription endpoint.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-44004",
"url": "https://www.suse.com/security/cve/CVE-2025-44004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-44004"
},
{
"cve": "CVE-2025-48731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-48731"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to check the access of the user to the Confluence space which allows attackers to edit a subscription for a Confluence space the user does not have access for via edit subscription endpoint.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-48731",
"url": "https://www.suse.com/security/cve/CVE-2025-48731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-48731"
},
{
"cve": "CVE-2025-49221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-49221"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to enforce authentication of the user to the Mattermost instance which allows unauthenticated attackers to access subscription details without via API call to GET subscription endpoint.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-49221",
"url": "https://www.suse.com/security/cve/CVE-2025-49221"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-49221"
},
{
"cve": "CVE-2025-50946",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-50946"
}
],
"notes": [
{
"category": "general",
"text": "OS Command Injection in Olivetin 2025.4.22 Custom Themes via the ParseRequestURI function in service/internal/executor/arguments.go.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-50946",
"url": "https://www.suse.com/security/cve/CVE-2025-50946"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-50946"
},
{
"cve": "CVE-2025-52931",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-52931"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to handle unexpected request body which allows attackers to crash the plugin via constant hit to update channel subscription endpoint with an invalid request body.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-52931",
"url": "https://www.suse.com/security/cve/CVE-2025-52931"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-52931"
},
{
"cve": "CVE-2025-53514",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-53514"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to handle unexpected request body which allows attackers to crash the plugin via constant hit to server webhook endpoint with an invalid request body.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-53514",
"url": "https://www.suse.com/security/cve/CVE-2025-53514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-53514"
},
{
"cve": "CVE-2025-53857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-53857"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to check the access of the user to the channel which allows attackers to get channel subscription details without proper access to the channel via API call to the GET autocomplete/GetChannelSubscriptions endpoint.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-53857",
"url": "https://www.suse.com/security/cve/CVE-2025-53857"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-53857"
},
{
"cve": "CVE-2025-53910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-53910"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to check the access of the user to the channel which allows attackers to create a channel subscription without proper access to the channel via API call to the edit channel subscription endpoint.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-53910",
"url": "https://www.suse.com/security/cve/CVE-2025-53910"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-53910"
},
{
"cve": "CVE-2025-54458",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-54458"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to check the access of the user to the Confluence space which allows attackers to create a subscription for a Confluence space the user does not have access to via the create subscription endpoint.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-54458",
"url": "https://www.suse.com/security/cve/CVE-2025-54458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-54458"
},
{
"cve": "CVE-2025-54463",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-54463"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to handle unexpected request body which allows attackers to crash the plugin via constant hit to server webhook endpoint with an invalid request body.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-54463",
"url": "https://www.suse.com/security/cve/CVE-2025-54463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-54463"
},
{
"cve": "CVE-2025-54478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-54478"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to enforce authentication of the user to the Mattermost instance which allows unauthenticated attackers to edit channel subscriptions via API call to the edit channel subscription endpoint.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-54478",
"url": "https://www.suse.com/security/cve/CVE-2025-54478"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-54478"
},
{
"cve": "CVE-2025-54525",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-54525"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to handle unexpected request body which allows attackers to crash the plugin via constant hit to create channel subscription endpoint with an invalid request body.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-54525",
"url": "https://www.suse.com/security/cve/CVE-2025-54525"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-54525"
},
{
"cve": "CVE-2025-55196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55196"
}
],
"notes": [
{
"category": "general",
"text": "External Secrets Operator is a Kubernetes operator that integrates external secret management systems. From version 0.15.0 to before 0.19.2, a vulnerability was discovered where the List() calls for Kubernetes Secret and SecretStore resources performed by the PushSecret controller did not apply a namespace selector. This flaw allowed an attacker to use label selectors to list and read secrets/secret-stores across the cluster, bypassing intended namespace restrictions. An attacker with the ability to create or update PushSecret resources and control SecretStore configurations could exploit this vulnerability to exfiltrate sensitive data from arbitrary namespaces. This could lead to full disclosure of Kubernetes secrets, including credentials, tokens, and other sensitive information stored in the cluster. This vulnerability has been patched in version 0.19.2. A workaround for this issue includes auditing and restricting RBAC permissions so that only trusted service accounts can create or update PushSecret and SecretStore resources.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55196",
"url": "https://www.suse.com/security/cve/CVE-2025-55196"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "not set"
}
],
"title": "CVE-2025-55196"
},
{
"cve": "CVE-2025-55198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55198"
}
],
"notes": [
{
"category": "general",
"text": "Helm is a package manager for Charts for Kubernetes. Prior to version 3.18.5, when parsing Chart.yaml and index.yaml files, an improper validation of type error can lead to a panic. This issue has been resolved in Helm 3.18.5. A workaround involves ensuring YAML files are formatted as Helm expects prior to processing them with Helm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55198",
"url": "https://www.suse.com/security/cve/CVE-2025-55198"
},
{
"category": "external",
"summary": "SUSE Bug 1248092 for CVE-2025-55198",
"url": "https://bugzilla.suse.com/1248092"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-55198"
},
{
"cve": "CVE-2025-55199",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55199"
}
],
"notes": [
{
"category": "general",
"text": "Helm is a package manager for Charts for Kubernetes. Prior to version 3.18.5, it is possible to craft a JSON Schema file in a manner which could cause Helm to use all available memory and have an out of memory (OOM) termination. This issue has been resolved in Helm 3.18.5. A workaround involves ensuring all Helm charts that are being loaded into Helm do not have any reference of $ref pointing to /dev/zero.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55199",
"url": "https://www.suse.com/security/cve/CVE-2025-55199"
},
{
"category": "external",
"summary": "SUSE Bug 1248093 for CVE-2025-55199",
"url": "https://bugzilla.suse.com/1248093"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-55199"
},
{
"cve": "CVE-2025-8285",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-8285"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to check the access of the user to the channel which allows attackers to create channel subscription without proper access to the channel via API call to the create channel subscription endpoint.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-8285",
"url": "https://www.suse.com/security/cve/CVE-2025-8285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-8285"
},
{
"cve": "CVE-2025-9039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-9039"
}
],
"notes": [
{
"category": "general",
"text": "We identified an issue in the Amazon ECS agent where, under certain conditions, an introspection server could be accessed off-host by another instance if the instances are in the same security group or if their security groups allow incoming connections that include the port where the server is hosted. This issue does not affect instances where the option to allow off-host access to the introspection server is set to \u0027false\u0027.\n\nThis issue has been addressed in ECS agent version 1.97.1. We recommend upgrading to the latest version and ensuring any forked or derivative code is patched to incorporate the new fixes. \n\nIf customers cannot update to the latest AMI, they can modify the Amazon EC2 security groups to restrict incoming access to the introspection server port (51678).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-9039",
"url": "https://www.suse.com/security/cve/CVE-2025-9039"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-9039"
}
]
}
CERTFR-2025-AVI-1131
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Db2 Warehouse | Db2 Warehouse on Cloud Pak for Data versions antérieures à 5.3.0 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.0 versions antérieures à 7.5.0 UP14 IF03 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.3.0.x antérieures à 6.3.0.16 | ||
| IBM | QRadar | QRadar Suite Software versions 1.11.x antérieures à 1.11.8.0 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.4.0.x antérieures à 6.4.0.5 | ||
| IBM | Sterling Partner Engagement Manager Standard Edition | Sterling Partner Engagement Manager Standard Edition versions 6.2.4.x antérieures à 6.2.4.5 | ||
| IBM | Sterling Partner Engagement Manager Standard Edition | Sterling Partner Engagement Manager Standard Edition versions 6.2.3.x antérieures à 6.2.3.5 | ||
| IBM | Db2 | Db2 on Cloud Pak for Data versions antérieures à 5.3.0 | ||
| IBM | Cognos Dashboards | Cognos Dashboards on Cloud Pak for Data versions 5.x antérieures à 5.3 | ||
| IBM | Db2 | Db2 Intelligence Center versions 1.1.x antérieures à 1.1.3.0 | ||
| IBM | Sterling Partner Engagement Manager Essentials Edition | Sterling Partner Engagement Manager Essentials Edition versions 6.2.4.x antérieures à 6.2.4.2 | ||
| IBM | Sterling Partner Engagement Manager Essentials Edition | Sterling Partner Engagement Manager Essentials Edition versions 6.2.3.x antérieures à 6.2.3.5 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Db2 Warehouse on Cloud Pak for Data versions ant\u00e9rieures \u00e0 5.3.0",
"product": {
"name": "Db2 Warehouse",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.0 versions ant\u00e9rieures \u00e0 7.5.0 UP14 IF03",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.3.0.x ant\u00e9rieures \u00e0 6.3.0.16",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions 1.11.x ant\u00e9rieures \u00e0 1.11.8.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.4.0.x ant\u00e9rieures \u00e0 6.4.0.5",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager Standard Edition versions 6.2.4.x ant\u00e9rieures \u00e0 6.2.4.5 ",
"product": {
"name": "Sterling Partner Engagement Manager Standard Edition",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager Standard Edition versions 6.2.3.x ant\u00e9rieures \u00e0 6.2.3.5 ",
"product": {
"name": "Sterling Partner Engagement Manager Standard Edition",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 on Cloud Pak for Data versions ant\u00e9rieures \u00e0 5.3.0",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Dashboards on Cloud Pak for Data versions 5.x ant\u00e9rieures \u00e0 5.3",
"product": {
"name": "Cognos Dashboards",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Intelligence Center versions 1.1.x ant\u00e9rieures \u00e0 1.1.3.0",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager Essentials Edition versions 6.2.4.x ant\u00e9rieures \u00e0 6.2.4.2",
"product": {
"name": "Sterling Partner Engagement Manager Essentials Edition",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager Essentials Edition versions 6.2.3.x ant\u00e9rieures \u00e0 6.2.3.5",
"product": {
"name": "Sterling Partner Engagement Manager Essentials Edition",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2025-2534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2534"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2025-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4447"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2021-26272",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26272"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2024-49350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49350"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-36131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36131"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2025-30065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30065"
},
{
"name": "CVE-2024-47118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47118"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2021-47621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47621"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2025-61912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61912"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-55198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55198"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2022-25927",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25927"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2025-1992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1992"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-36136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36136"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2020-9493",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9493"
},
{
"name": "CVE-2025-36008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36008"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2024-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23454"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-36006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36006"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2025-36186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36186"
},
{
"name": "CVE-2025-55182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55182"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-6493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6493"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-33012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33012"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2025-5187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5187"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-41235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41235"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2023-53539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53539"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-2518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2518"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2024-38827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38827"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-55199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55199"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2018-10237",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10237"
},
{
"name": "CVE-2025-59250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59250"
},
{
"name": "CVE-2025-1493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1493"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2025-3050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3050"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-1767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1767"
},
{
"name": "CVE-2021-26271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26271"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2024-38821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38821"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2023-53401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53401"
},
{
"name": "CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0915"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-52903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52903"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-46653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46653"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2018-14721",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14721"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-2900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2900"
},
{
"name": "CVE-2025-0426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0426"
},
{
"name": "CVE-2020-9281",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9281"
},
{
"name": "CVE-2024-50301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50301"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-1000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1000"
},
{
"name": "CVE-2022-3697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3697"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-53513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53513"
},
{
"name": "CVE-2025-33134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33134"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2023-39804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2024-22354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22354"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6442"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2022-50543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50543"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-61911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61911"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2025-14687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14687"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2025-47287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47287"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"name": "CVE-2025-36185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36185"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"initial_release_date": "2025-12-19T00:00:00",
"last_revision_date": "2025-12-19T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1131",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-12-15",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7252732",
"url": "https://www.ibm.com/support/pages/node/7252732"
},
{
"published_at": "2025-12-15",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7254815",
"url": "https://www.ibm.com/support/pages/node/7254815"
},
{
"published_at": "2025-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7255060",
"url": "https://www.ibm.com/support/pages/node/7255060"
},
{
"published_at": "2025-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7255154",
"url": "https://www.ibm.com/support/pages/node/7255154"
},
{
"published_at": "2025-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7255095",
"url": "https://www.ibm.com/support/pages/node/7255095"
},
{
"published_at": "2025-12-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7254849",
"url": "https://www.ibm.com/support/pages/node/7254849"
},
{
"published_at": "2025-12-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7254850",
"url": "https://www.ibm.com/support/pages/node/7254850"
},
{
"published_at": "2025-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7255160",
"url": "https://www.ibm.com/support/pages/node/7255160"
},
{
"published_at": "2025-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7255065",
"url": "https://www.ibm.com/support/pages/node/7255065"
}
]
}
msrc_cve-2025-55198
Vulnerability from csaf_microsoft
Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-55198 Helm May Panic Due To Incorrect YAML Content - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-55198.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Helm May Panic Due To Incorrect YAML Content",
"tracking": {
"current_release_date": "2025-09-04T00:18:06.000Z",
"generator": {
"date": "2025-10-20T03:41:12.346Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-55198",
"initial_release_date": "2025-08-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-09-04T00:18:06.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "cbl2 helm 3.14.2-7",
"product": {
"name": "cbl2 helm 3.14.2-7",
"product_id": "3"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 helm 3.14.2-9",
"product": {
"name": "\u003ccbl2 helm 3.14.2-9",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 helm 3.14.2-9",
"product": {
"name": "cbl2 helm 3.14.2-9",
"product_id": "20533"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 helm 3.14.2-8",
"product": {
"name": "\u003ccbl2 helm 3.14.2-8",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 helm 3.14.2-8",
"product": {
"name": "cbl2 helm 3.14.2-8",
"product_id": "20402"
}
}
],
"category": "product_name",
"name": "helm"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 helm 3.14.2-7 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 helm 3.14.2-9 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 helm 3.14.2-9 as a component of CBL Mariner 2.0",
"product_id": "20533-17086"
},
"product_reference": "20533",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 helm 3.14.2-8 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 helm 3.14.2-8 as a component of CBL Mariner 2.0",
"product_id": "20402-17086"
},
"product_reference": "20402",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55198",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "general",
"text": "GitHub_M",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20533-17086",
"20402-17086"
],
"known_affected": [
"17086-3",
"17086-1",
"17086-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-55198 Helm May Panic Due To Incorrect YAML Content - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-55198.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-04T00:18:06.000Z",
"details": "3.14.2-9:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-1",
"17086-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"17086-3",
"17086-1",
"17086-2"
]
}
],
"title": "Helm May Panic Due To Incorrect YAML Content"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.